TeeKai Tracking Online 1.0 uses weak encryption of web usage statistics in data/userlog/log.txt, which allows remote attackers to identify IP's visiting the site by dividing each octet by the MD5 hash of '20'.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/82/275246 | Broken Link Third Party Advisory VDB Entry |
http://www.iss.net/security_center/static/9286.php | Broken Link |
http://www.securityfocus.com/bid/4926 | Broken Link Exploit Third Party Advisory VDB Entry |
http://online.securityfocus.com/archive/82/275246 | Broken Link Third Party Advisory VDB Entry |
http://www.iss.net/security_center/static/9286.php | Broken Link |
http://www.securityfocus.com/bid/4926 | Broken Link Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2002-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-2058
Mitre link : CVE-2002-2058
CVE.ORG link : CVE-2002-2058
JSON object : View
Products Affected
teekai
- tracking_online
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm